You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This comprehensively updated second edition provides an introduction to the political, normative, technological and strategic aspects of nuclear weaponry. It offers an accessible overview of the concept of nuclear weapons, outlines how thinking about these weapons has developed and considers how nuclear threats can continue to be managed in the future. This book will help you to understand what nuclear weapons are, the science behind their creation and operation, why states build them in the first place, and whether it will be possible for the world to banish these weapons entirely. Essential reading for all students of International Relations, Security Studies and Military History.
Young women bound for Islamic State, or "Free Speech" protests for Tommy Robinson--radicalization spans ideologies. Though an often-used term, the process of radicalization is not well understood, and the role of gender within it is often ignored. This book reveals the centrality of gender to radicalization, using primary research among two of Britain's key extremist movements: the banned Islamist group al-Muhajiroun, and those networked to it; and the anti-Islam radical right, including the English Defence League and Britain First. Through interviews with leaders including Anjem Choudary, Jayda Fransen and Tommy Robinson, as well as their followers, Elizabeth Pearson explores the making of ...
Nuclear Safeguards, Security and Nonproliferation: Achieving Security with Technology and Policy, Second Edition is a comprehensive reference covering the cutting-edge technologies used to trace, track and safeguard nuclear material. Sections cover security, the illicit trafficking of nuclear materials, improvised nuclear devices, and how to prevent nuclear terrorism. International case studies of security at nuclear facilities and illegal nuclear trade activities provide specific examples of the complex issues surrounding the technology and policy for nuclear material protection, control and accountability. New case studies include analyses of nuclear programs of important countries, such as North Korea, Iran, and Kazakhstan, among others. This is a thoroughly updated, must-have volume for private and public organizations involved in driving national security, domestic and international policy issues relating to nuclear material security, non-proliferation, and nuclear transparency.
"Examines the history and effectiveness of US efforts to prevent the spread of nuclear weapons"--
Within a year of President George W. Bush announcing the end of major combat operations in Iraq in May 2003, dozens of attacks by insurgents had claimed hundreds of civilian and military lives. Through 2004 and 2005, accounts from returning veterans presaged an unfolding strategic debacle—potentially made worse by U.S. tactics being focused on extending conventionally oriented military operations rather than on adapting to the insurgency. By 2007, however, a sea change had taken place, and some U.S. units were integrating counterinsurgency tactics and full-spectrum operations to great effect. In the main, the government and the media cited three factors for having turned the tide on the ba...
The sharing of nuclear weapons technology between states is unexpected, because nuclear weapons are such a powerful instrument in international politics, but sharing is not rare. This book proposes a theory to explain nuclear sharing and surveys its rich history from its beginnings in the Second World War.
This authoritative volume assesses how the recently democratized political system in Poland is adapting to the challenges posed by the country's adhesion to NATO which it joined in 1999. The contributors analyse Poland's performance as a newcomer.
Over 1,600 total pages ... CONTENTS: AN OPEN SOURCE APPROACH TO SOCIAL MEDIA DATA GATHERING Open Source Intelligence – Doctrine’s Neglected Child (Unclassified) Aggregation Techniques to Characterize Social Networks Open Source Intelligence (OSINT): Issues for Congress A BURNING NEED TO KNOW: THE USE OF OPEN SOURCE INTELLIGENCE IN THE FIRE SERVICE Balancing Social Media with Operations Security (OPSEC) in the 21st Century Sailing the Sea of OSINT in the Information Age Social Media: Valuable Tools in Today‘s Operational Environment ENHANCING A WEB CRAWLER WITH ARABIC SEARCH CAPABILITY UTILIZING SOCIAL MEDIA TO FURTHER THE NATIONWIDE SUSPICIOUS ACTIVITY REPORTING INITIATIVE THE WHO, WHAT AND HOW OF SOCIAL MEDIA EXPLOITATION FOR A COMBATANT COMMANDER Open Source Cybersecurity for the 21st Century UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? ATP 2-22.9 Open-Source Intelligence NTTP 3-13.3M OPERATIONS SECURITY (OPSEC) FM 2-22.3 HUMAN INTELLIGENCE COLLECTOR OPERATIONS
The archetype of 'my enemy's enemy is my friend', India's political and economic presence in Afghanistan is often viewed as a Machiavellian ploy aimed against Pakistan. Challenging deeply held beliefs about an India-Pakistan proxy war, this work offers a nuanced explanation of India's strategic intent and actions, which is critical to resolving the seemingly unending war in Afghanistan, as well as wider bilateral disputes between the two South Asian rivals
An exploration of the strategies that both governments and insurgents employed in the liberation wars in Iraqi Kurdistan and South Sudan.